SUSE-SU-2025:4515-1

Vulnerability from csaf_suse - Published: 2025-12-23 16:19 - Updated: 2025-12-23 16:19
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2022-50364: i2c: mux: reg: check return value after calling platform_get_resource() (bsc#1250083). - CVE-2022-50368: drm/msm/dsi: fix memory corruption with too many bridges (bsc#1250009). - CVE-2022-50494: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash (bsc#1251173). - CVE-2022-50545: r6040: Fix kmemleak in probe and remove (bsc#1251285). - CVE-2022-50551: wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request() (bsc#1251322). - CVE-2022-50569: xfrm: Update ipcomp_scratches with NULL when freed (bsc#1252640). - CVE-2022-50578: class: fix possible memory leak in __class_register() (bsc#1252519). - CVE-2023-53229: wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta (bsc#1249650). - CVE-2023-53369: net: dcb: choose correct policy to parse DCB_ATTR_BCN (bsc#1250206). - CVE-2023-53431: scsi: ses: Don't attach if enclosure has no components (bsc#1250374). - CVE-2023-53542: ARM: dts: exynos: Use Exynos5420 compatible for the MIPI video phy (bsc#1251154). - CVE-2023-53597: cifs: fix mid leak during reconnection after timeout threshold (bsc#1251159). - CVE-2023-53641: wifi: ath9k: hif_usb: fix memory leak of remain_skbs (bsc#1251728). - CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786). - CVE-2025-38436: drm/scheduler: signal scheduled fence when kill job (bsc#1247227). - CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176). - CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033). - CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303). - CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763). - CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773). - CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780). - CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862). - CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821). - CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836). - CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912). - CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421). - CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436). - CVE-2025-40205: btrfs: avoid potential out-of-bounds in btrfs_encode_fh() (bsc#1253456). The following non-security bugs were fixed: - KVM: x86: Give a hint when Win2016 might fail to boot due to XSAVES erratum (git-fixes). - PCI: aardvark: Fix checking for MEM resource type (git-fixes). - cifs: Check the lease context if we actually got a lease (bsc#1228688). - cifs: return a single-use cfid if we did not get a lease (bsc#1228688). - dmaengine: bcm2835: Avoid GFP_KERNEL in device_prep_slave_sg (bsc#1070872). - kabi/severities: Update info about kvm_86_ops. - net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve (bsc#1220419). - skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650). - smb3: fix Open files on server counter going negative (git-fixes). - tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork (bsc#1250705). - tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650). - thermal: intel_powerclamp: Use first online CPU as control_cpu (bsc#1251173).
Patchnames
SUSE-2025-4515,SUSE-SLE-Live-Patching-12-SP5-2025-4515,SUSE-SLE-SERVER-12-SP5-LTSS-2025-4515,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4515
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50364: i2c: mux: reg: check return value after calling platform_get_resource() (bsc#1250083).\n- CVE-2022-50368: drm/msm/dsi: fix memory corruption with too many bridges (bsc#1250009).\n- CVE-2022-50494: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash (bsc#1251173).\n- CVE-2022-50545: r6040: Fix kmemleak in probe and remove (bsc#1251285).\n- CVE-2022-50551: wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request() (bsc#1251322).\n- CVE-2022-50569: xfrm: Update ipcomp_scratches with NULL when freed (bsc#1252640).\n- CVE-2022-50578: class: fix possible memory leak in __class_register() (bsc#1252519).\n- CVE-2023-53229: wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta (bsc#1249650).\n- CVE-2023-53369: net: dcb: choose correct policy to parse DCB_ATTR_BCN (bsc#1250206).\n- CVE-2023-53431: scsi: ses: Don\u0027t attach if enclosure has no components (bsc#1250374).\n- CVE-2023-53542: ARM: dts: exynos: Use Exynos5420 compatible for the MIPI video phy (bsc#1251154).\n- CVE-2023-53597: cifs: fix mid leak during reconnection after timeout threshold (bsc#1251159).\n- CVE-2023-53641: wifi: ath9k: hif_usb: fix memory leak of remain_skbs (bsc#1251728).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-38436: drm/scheduler: signal scheduled fence when kill job (bsc#1247227).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n- CVE-2025-40205: btrfs: avoid potential out-of-bounds in btrfs_encode_fh() (bsc#1253456).\n\nThe following non-security bugs were fixed:\n\n- KVM: x86: Give a hint when Win2016 might fail to boot due to XSAVES erratum (git-fixes).\n- PCI: aardvark: Fix checking for MEM resource type (git-fixes).\n- cifs: Check the lease context if we actually got a lease (bsc#1228688).\n- cifs: return a single-use cfid if we did not get a lease (bsc#1228688).\n- dmaengine: bcm2835: Avoid GFP_KERNEL in device_prep_slave_sg (bsc#1070872).\n- kabi/severities: Update info about kvm_86_ops.\n- net/sched: sch_hfsc: upgrade \u0027rt\u0027 to \u0027sc\u0027 when it becomes a inner curve (bsc#1220419).\n- skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650).\n- smb3: fix Open files on server counter going negative (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650).\n- thermal: intel_powerclamp: Use first online CPU as control_cpu (bsc#1251173).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2025-4515,SUSE-SLE-Live-Patching-12-SP5-2025-4515,SUSE-SLE-SERVER-12-SP5-LTSS-2025-4515,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4515",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4515-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2025:4515-1",
        "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254515-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2025:4515-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1070872",
        "url": "https://bugzilla.suse.com/1070872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220419",
        "url": "https://bugzilla.suse.com/1220419"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1228688",
        "url": "https://bugzilla.suse.com/1228688"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1247227",
        "url": "https://bugzilla.suse.com/1247227"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1249650",
        "url": "https://bugzilla.suse.com/1249650"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1250009",
        "url": "https://bugzilla.suse.com/1250009"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1250083",
        "url": "https://bugzilla.suse.com/1250083"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1250176",
        "url": "https://bugzilla.suse.com/1250176"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1250206",
        "url": "https://bugzilla.suse.com/1250206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1250374",
        "url": "https://bugzilla.suse.com/1250374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1250650",
        "url": "https://bugzilla.suse.com/1250650"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1250705",
        "url": "https://bugzilla.suse.com/1250705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1251154",
        "url": "https://bugzilla.suse.com/1251154"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1251159",
        "url": "https://bugzilla.suse.com/1251159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1251173",
        "url": "https://bugzilla.suse.com/1251173"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1251285",
        "url": "https://bugzilla.suse.com/1251285"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1251322",
        "url": "https://bugzilla.suse.com/1251322"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1251728",
        "url": "https://bugzilla.suse.com/1251728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1251786",
        "url": "https://bugzilla.suse.com/1251786"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252033",
        "url": "https://bugzilla.suse.com/1252033"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252303",
        "url": "https://bugzilla.suse.com/1252303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252519",
        "url": "https://bugzilla.suse.com/1252519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252640",
        "url": "https://bugzilla.suse.com/1252640"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252763",
        "url": "https://bugzilla.suse.com/1252763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252773",
        "url": "https://bugzilla.suse.com/1252773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252780",
        "url": "https://bugzilla.suse.com/1252780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252821",
        "url": "https://bugzilla.suse.com/1252821"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252836",
        "url": "https://bugzilla.suse.com/1252836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252862",
        "url": "https://bugzilla.suse.com/1252862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252912",
        "url": "https://bugzilla.suse.com/1252912"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1253237",
        "url": "https://bugzilla.suse.com/1253237"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1253421",
        "url": "https://bugzilla.suse.com/1253421"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1253436",
        "url": "https://bugzilla.suse.com/1253436"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1253438",
        "url": "https://bugzilla.suse.com/1253438"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1253456",
        "url": "https://bugzilla.suse.com/1253456"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50364 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50364/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50368 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50368/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50494 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50494/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50545 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50545/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50551 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50551/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50569 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50569/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50578 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50578/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53229 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53229/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53369 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53431 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53431/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53542 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53542/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53597 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53597/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53641 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53641/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53676 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53676/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38436 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38436/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-39819 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-39819/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-39967 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-39967/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40001 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40001/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40027 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40027/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40030 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40030/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40040 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40040/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40048 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40048/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40055 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40055/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40070 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40070/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40083 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40083/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40173 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40173/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40186 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40186/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40204 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40205 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40205/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2025-12-23T16:19:45Z",
      "generator": {
        "date": "2025-12-23T16:19:45Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2025:4515-1",
      "initial_release_date": "2025-12-23T16:19:45Z",
      "revision_history": [
        {
          "date": "2025-12-23T16:19:45Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.283.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.283.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-122.283.1.aarch64",
                  "product_id": "kernel-default-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.283.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.283.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.283.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.283.1.aarch64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.283.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.283.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.283.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.283.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.283.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.283.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.283.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.283.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.283.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-122.283.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-122.283.1.noarch",
                  "product_id": "kernel-devel-4.12.14-122.283.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-122.283.1.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-122.283.1.noarch",
                  "product_id": "kernel-docs-4.12.14-122.283.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-122.283.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-122.283.1.noarch",
                  "product_id": "kernel-docs-html-4.12.14-122.283.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-122.283.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-122.283.1.noarch",
                  "product_id": "kernel-macros-4.12.14-122.283.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-122.283.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-122.283.1.noarch",
                  "product_id": "kernel-source-4.12.14-122.283.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-122.283.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-122.283.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-122.283.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.283.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-122.283.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.283.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.283.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.283.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
                  "product_id": "kernel-default-kgraft-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.283.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.283.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-122.283.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.283.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.283.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.283.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.283.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-122.283.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.283.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.283.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.283.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.283.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-default-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-default-kgraft-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-syms-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-122.283.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.283.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-122.283.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.283.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.283.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.283.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.283.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.283.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-default-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.283.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.283.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.283.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.283.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.283.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.283.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.283.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.283.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.283.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.283.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.283.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.283.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.283.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.283.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.283.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.283.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.283.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.283.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.283.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.283.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.283.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.283.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.283.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-122.283.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.283.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-122.283.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.283.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-122.283.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.283.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.283.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.283.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-122.283.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.283.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-122.283.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.283.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.283.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.283.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.283.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.283.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.283.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-122.283.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-122.283.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.283.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.283.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.283.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.283.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.283.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.283.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.283.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-122.283.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.283.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-122.283.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.283.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-122.283.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.283.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.283.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.283.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.283.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.283.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.283.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.283.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.283.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.283.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.283.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.283.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-50364",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50364"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: mux: reg: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref in resource_size(), if platform_get_resource()\nreturns NULL, move calling resource_size() after devm_ioremap_resource() that\nwill check \u0027res\u0027 to avoid null-ptr-deref.\nAnd use devm_platform_get_and_ioremap_resource() to simplify code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50364",
          "url": "https://www.suse.com/security/cve/CVE-2022-50364"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1250083 for CVE-2022-50364",
          "url": "https://bugzilla.suse.com/1250083"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50364"
    },
    {
      "cve": "CVE-2022-50368",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50368"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dsi: fix memory corruption with too many bridges\n\nAdd the missing sanity check on the bridge counter to avoid corrupting\ndata beyond the fixed-sized bridge array in case there are ever more\nthan eight bridges.\n\nPatchwork: https://patchwork.freedesktop.org/patch/502668/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50368",
          "url": "https://www.suse.com/security/cve/CVE-2022-50368"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1250009 for CVE-2022-50368",
          "url": "https://bugzilla.suse.com/1250009"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50368"
    },
    {
      "cve": "CVE-2022-50494",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50494"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash\n\nWhen CPU 0 is offline and intel_powerclamp is used to inject\nidle, it generates kernel BUG:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: bash/15687\ncaller is debug_smp_processor_id+0x17/0x20\nCPU: 4 PID: 15687 Comm: bash Not tainted 5.19.0-rc7+ #57\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x49/0x63\ndump_stack+0x10/0x16\ncheck_preemption_disabled+0xdd/0xe0\ndebug_smp_processor_id+0x17/0x20\npowerclamp_set_cur_state+0x7f/0xf9 [intel_powerclamp]\n...\n...\n\nHere CPU 0 is the control CPU by default and changed to the current CPU,\nif CPU 0 offlined. This check has to be performed under cpus_read_lock(),\nhence the above warning.\n\nUse get_cpu() instead of smp_processor_id() to avoid this BUG.\n\n[ rjw: Subject edits ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50494",
          "url": "https://www.suse.com/security/cve/CVE-2022-50494"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251173 for CVE-2022-50494",
          "url": "https://bugzilla.suse.com/1251173"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50494"
    },
    {
      "cve": "CVE-2022-50545",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50545"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nr6040: Fix kmemleak in probe and remove\n\nThere is a memory leaks reported by kmemleak:\n\n  unreferenced object 0xffff888116111000 (size 2048):\n    comm \"modprobe\", pid 817, jiffies 4294759745 (age 76.502s)\n    hex dump (first 32 bytes):\n      00 c4 0a 04 81 88 ff ff 08 10 11 16 81 88 ff ff  ................\n      08 10 11 16 81 88 ff ff 00 00 00 00 00 00 00 00  ................\n    backtrace:\n      [\u003cffffffff815bcd82\u003e] kmalloc_trace+0x22/0x60\n      [\u003cffffffff827e20ee\u003e] phy_device_create+0x4e/0x90\n      [\u003cffffffff827e6072\u003e] get_phy_device+0xd2/0x220\n      [\u003cffffffff827e7844\u003e] mdiobus_scan+0xa4/0x2e0\n      [\u003cffffffff827e8be2\u003e] __mdiobus_register+0x482/0x8b0\n      [\u003cffffffffa01f5d24\u003e] r6040_init_one+0x714/0xd2c [r6040]\n      ...\n\nThe problem occurs in probe process as follows:\n  r6040_init_one:\n    mdiobus_register\n      mdiobus_scan    \u003c- alloc and register phy_device,\n                         the reference count of phy_device is 3\n    r6040_mii_probe\n      phy_connect     \u003c- connect to the first phy_device,\n                         so the reference count of the first\n                         phy_device is 4, others are 3\n    register_netdev   \u003c- fault inject succeeded, goto error handling path\n\n    // error handling path\n    err_out_mdio_unregister:\n      mdiobus_unregister(lp-\u003emii_bus);\n    err_out_mdio:\n      mdiobus_free(lp-\u003emii_bus);    \u003c- the reference count of the first\n                                       phy_device is 1, it is not released\n                                       and other phy_devices are released\n  // similarly, the remove process also has the same problem\n\nThe root cause is traced to the phy_device is not disconnected when\nremoves one r6040 device in r6040_remove_one() or on error handling path\nafter r6040_mii probed successfully. In r6040_mii_probe(), a net ethernet\ndevice is connected to the first PHY device of mii_bus, in order to\nnotify the connected driver when the link status changes, which is the\ndefault behavior of the PHY infrastructure to handle everything.\nTherefore the phy_device should be disconnected when removes one r6040\ndevice or on error handling path.\n\nFix it by adding phy_disconnect() when removes one r6040 device or on\nerror handling path after r6040_mii probed successfully.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50545",
          "url": "https://www.suse.com/security/cve/CVE-2022-50545"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251285 for CVE-2022-50545",
          "url": "https://bugzilla.suse.com/1251285"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50545"
    },
    {
      "cve": "CVE-2022-50551",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50551"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request()\n\nThis patch fixes a shift-out-of-bounds in brcmfmac that occurs in\nBIT(chiprev) when a \u0027chiprev\u0027 provided by the device is too large.\nIt should also not be equal to or greater than BITS_PER_TYPE(u32)\nas we do bitwise AND with a u32 variable and BIT(chiprev). The patch\nadds a check that makes the function return NULL if that is the case.\nNote that the NULL case is later handled by the bus-specific caller,\nbrcmf_usb_probe_cb() or brcmf_usb_reset_resume(), for example.\n\nFound by a modified version of syzkaller.\n\nUBSAN: shift-out-of-bounds in drivers/net/wireless/broadcom/brcm80211/brcmfmac/firmware.c\nshift exponent 151055786 is too large for 64-bit type \u0027long unsigned int\u0027\nCPU: 0 PID: 1885 Comm: kworker/0:2 Tainted: G           O      5.14.0+ #132\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n dump_stack_lvl+0x57/0x7d\n ubsan_epilogue+0x5/0x40\n __ubsan_handle_shift_out_of_bounds.cold+0x53/0xdb\n ? lock_chain_count+0x20/0x20\n brcmf_fw_alloc_request.cold+0x19/0x3ea\n ? brcmf_fw_get_firmwares+0x250/0x250\n ? brcmf_usb_ioctl_resp_wait+0x1a7/0x1f0\n brcmf_usb_get_fwname+0x114/0x1a0\n ? brcmf_usb_reset_resume+0x120/0x120\n ? number+0x6c4/0x9a0\n brcmf_c_process_clm_blob+0x168/0x590\n ? put_dec+0x90/0x90\n ? enable_ptr_key_workfn+0x20/0x20\n ? brcmf_common_pd_remove+0x50/0x50\n ? rcu_read_lock_sched_held+0xa1/0xd0\n brcmf_c_preinit_dcmds+0x673/0xc40\n ? brcmf_c_set_joinpref_default+0x100/0x100\n ? rcu_read_lock_sched_held+0xa1/0xd0\n ? rcu_read_lock_bh_held+0xb0/0xb0\n ? lock_acquire+0x19d/0x4e0\n ? find_held_lock+0x2d/0x110\n ? brcmf_usb_deq+0x1cc/0x260\n ? mark_held_locks+0x9f/0xe0\n ? lockdep_hardirqs_on_prepare+0x273/0x3e0\n ? _raw_spin_unlock_irqrestore+0x47/0x50\n ? trace_hardirqs_on+0x1c/0x120\n ? brcmf_usb_deq+0x1a7/0x260\n ? brcmf_usb_rx_fill_all+0x5a/0xf0\n brcmf_attach+0x246/0xd40\n ? wiphy_new_nm+0x1476/0x1d50\n ? kmemdup+0x30/0x40\n brcmf_usb_probe+0x12de/0x1690\n ? brcmf_usbdev_qinit.constprop.0+0x470/0x470\n usb_probe_interface+0x25f/0x710\n really_probe+0x1be/0xa90\n __driver_probe_device+0x2ab/0x460\n ? usb_match_id.part.0+0x88/0xc0\n driver_probe_device+0x49/0x120\n __device_attach_driver+0x18a/0x250\n ? driver_allows_async_probing+0x120/0x120\n bus_for_each_drv+0x123/0x1a0\n ? bus_rescan_devices+0x20/0x20\n ? lockdep_hardirqs_on_prepare+0x273/0x3e0\n ? trace_hardirqs_on+0x1c/0x120\n __device_attach+0x207/0x330\n ? device_bind_driver+0xb0/0xb0\n ? kobject_uevent_env+0x230/0x12c0\n bus_probe_device+0x1a2/0x260\n device_add+0xa61/0x1ce0\n ? __mutex_unlock_slowpath+0xe7/0x660\n ? __fw_devlink_link_to_suppliers+0x550/0x550\n usb_set_configuration+0x984/0x1770\n ? kernfs_create_link+0x175/0x230\n usb_generic_driver_probe+0x69/0x90\n usb_probe_device+0x9c/0x220\n really_probe+0x1be/0xa90\n __driver_probe_device+0x2ab/0x460\n driver_probe_device+0x49/0x120\n __device_attach_driver+0x18a/0x250\n ? driver_allows_async_probing+0x120/0x120\n bus_for_each_drv+0x123/0x1a0\n ? bus_rescan_devices+0x20/0x20\n ? lockdep_hardirqs_on_prepare+0x273/0x3e0\n ? trace_hardirqs_on+0x1c/0x120\n __device_attach+0x207/0x330\n ? device_bind_driver+0xb0/0xb0\n ? kobject_uevent_env+0x230/0x12c0\n bus_probe_device+0x1a2/0x260\n device_add+0xa61/0x1ce0\n ? __fw_devlink_link_to_suppliers+0x550/0x550\n usb_new_device.cold+0x463/0xf66\n ? hub_disconnect+0x400/0x400\n ? _raw_spin_unlock_irq+0x24/0x30\n hub_event+0x10d5/0x3330\n ? hub_port_debounce+0x280/0x280\n ? __lock_acquire+0x1671/0x5790\n ? wq_calc_node_cpumask+0x170/0x2a0\n ? lock_release+0x640/0x640\n ? rcu_read_lock_sched_held+0xa1/0xd0\n ? rcu_read_lock_bh_held+0xb0/0xb0\n ? lockdep_hardirqs_on_prepare+0x273/0x3e0\n process_one_work+0x873/0x13e0\n ? lock_release+0x640/0x640\n ? pwq_dec_nr_in_flight+0x320/0x320\n ? rwlock_bug.part.0+0x90/0x90\n worker_thread+0x8b/0xd10\n ? __kthread_parkme+0xd9/0x1d0\n ? pr\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50551",
          "url": "https://www.suse.com/security/cve/CVE-2022-50551"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251322 for CVE-2022-50551",
          "url": "https://bugzilla.suse.com/1251322"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50551"
    },
    {
      "cve": "CVE-2022-50569",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50569"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: Update ipcomp_scratches with NULL when freed\n\nCurrently if ipcomp_alloc_scratches() fails to allocate memory\nipcomp_scratches holds obsolete address. So when we try to free the\npercpu scratches using ipcomp_free_scratches() it tries to vfree non\nexistent vm area. Described below:\n\nstatic void * __percpu *ipcomp_alloc_scratches(void)\n{\n        ...\n        scratches = alloc_percpu(void *);\n        if (!scratches)\n                return NULL;\nipcomp_scratches does not know about this allocation failure.\nTherefore holding the old obsolete address.\n        ...\n}\n\nSo when we free,\n\nstatic void ipcomp_free_scratches(void)\n{\n        ...\n        scratches = ipcomp_scratches;\nAssigning obsolete address from ipcomp_scratches\n\n        if (!scratches)\n                return;\n\n        for_each_possible_cpu(i)\n               vfree(*per_cpu_ptr(scratches, i));\nTrying to free non existent page, causing warning: trying to vfree\nexistent vm area.\n        ...\n}\n\nFix this breakage by updating ipcomp_scrtches with NULL when scratches\nis freed",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50569",
          "url": "https://www.suse.com/security/cve/CVE-2022-50569"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252640 for CVE-2022-50569",
          "url": "https://bugzilla.suse.com/1252640"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50569"
    },
    {
      "cve": "CVE-2022-50578",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50578"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclass: fix possible memory leak in __class_register()\n\nIf class_add_groups() returns error, the \u0027cp-\u003esubsys\u0027 need be\nunregister, and the \u0027cp\u0027 need be freed.\n\nWe can not call kset_unregister() here, because the \u0027cls\u0027 will\nbe freed in callback function class_release() and it\u0027s also\nfreed in caller\u0027s error path, it will cause double free.\n\nSo fix this by calling kobject_del() and kfree_const(name) to\ncleanup kobject. Besides, call kfree() to free the \u0027cp\u0027.\n\nFault injection test can trigger this:\n\nunreferenced object 0xffff888102fa8190 (size 8):\n  comm \"modprobe\", pid 502, jiffies 4294906074 (age 49.296s)\n  hex dump (first 8 bytes):\n    70 6b 74 63 64 76 64 00                          pktcdvd.\n  backtrace:\n    [\u003c00000000e7c7703d\u003e] __kmalloc_track_caller+0x1ae/0x320\n    [\u003c000000005e4d70bc\u003e] kstrdup+0x3a/0x70\n    [\u003c00000000c2e5e85a\u003e] kstrdup_const+0x68/0x80\n    [\u003c000000000049a8c7\u003e] kvasprintf_const+0x10b/0x190\n    [\u003c0000000029123163\u003e] kobject_set_name_vargs+0x56/0x150\n    [\u003c00000000747219c9\u003e] kobject_set_name+0xab/0xe0\n    [\u003c0000000005f1ea4e\u003e] __class_register+0x15c/0x49a\n\nunreferenced object 0xffff888037274000 (size 1024):\n  comm \"modprobe\", pid 502, jiffies 4294906074 (age 49.296s)\n  hex dump (first 32 bytes):\n    00 40 27 37 80 88 ff ff 00 40 27 37 80 88 ff ff  .@\u00277.....@\u00277....\n    00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00  .....N..........\n  backtrace:\n    [\u003c00000000151f9600\u003e] kmem_cache_alloc_trace+0x17c/0x2f0\n    [\u003c00000000ecf3dd95\u003e] __class_register+0x86/0x49a",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50578",
          "url": "https://www.suse.com/security/cve/CVE-2022-50578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252519 for CVE-2022-50578",
          "url": "https://bugzilla.suse.com/1252519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50578"
    },
    {
      "cve": "CVE-2023-53229",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53229"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta\n\nAvoid potential data corruption issues caused by uninitialized driver\nprivate data structures.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53229",
          "url": "https://www.suse.com/security/cve/CVE-2023-53229"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249650 for CVE-2023-53229",
          "url": "https://bugzilla.suse.com/1249650"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53229"
    },
    {
      "cve": "CVE-2023-53369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dcb: choose correct policy to parse DCB_ATTR_BCN\n\nThe dcbnl_bcn_setcfg uses erroneous policy to parse tb[DCB_ATTR_BCN],\nwhich is introduced in commit 859ee3c43812 (\"DCB: Add support for DCB\nBCN\"). Please see the comment in below code\n\nstatic int dcbnl_bcn_setcfg(...)\n{\n  ...\n  ret = nla_parse_nested_deprecated(..., dcbnl_pfc_up_nest, .. )\n  // !!! dcbnl_pfc_up_nest for attributes\n  //  DCB_PFC_UP_ATTR_0 to DCB_PFC_UP_ATTR_ALL in enum dcbnl_pfc_up_attrs\n  ...\n  for (i = DCB_BCN_ATTR_RP_0; i \u003c= DCB_BCN_ATTR_RP_7; i++) {\n  // !!! DCB_BCN_ATTR_RP_0 to DCB_BCN_ATTR_RP_7 in enum dcbnl_bcn_attrs\n    ...\n    value_byte = nla_get_u8(data[i]);\n    ...\n  }\n  ...\n  for (i = DCB_BCN_ATTR_BCNA_0; i \u003c= DCB_BCN_ATTR_RI; i++) {\n  // !!! DCB_BCN_ATTR_BCNA_0 to DCB_BCN_ATTR_RI in enum dcbnl_bcn_attrs\n  ...\n    value_int = nla_get_u32(data[i]);\n  ...\n  }\n  ...\n}\n\nThat is, the nla_parse_nested_deprecated uses dcbnl_pfc_up_nest\nattributes to parse nlattr defined in dcbnl_pfc_up_attrs. But the\nfollowing access code fetch each nlattr as dcbnl_bcn_attrs attributes.\nBy looking up the associated nla_policy for dcbnl_bcn_attrs. We can find\nthe beginning part of these two policies are \"same\".\n\nstatic const struct nla_policy dcbnl_pfc_up_nest[...] = {\n        [DCB_PFC_UP_ATTR_0]   = {.type = NLA_U8},\n        [DCB_PFC_UP_ATTR_1]   = {.type = NLA_U8},\n        [DCB_PFC_UP_ATTR_2]   = {.type = NLA_U8},\n        [DCB_PFC_UP_ATTR_3]   = {.type = NLA_U8},\n        [DCB_PFC_UP_ATTR_4]   = {.type = NLA_U8},\n        [DCB_PFC_UP_ATTR_5]   = {.type = NLA_U8},\n        [DCB_PFC_UP_ATTR_6]   = {.type = NLA_U8},\n        [DCB_PFC_UP_ATTR_7]   = {.type = NLA_U8},\n        [DCB_PFC_UP_ATTR_ALL] = {.type = NLA_FLAG},\n};\n\nstatic const struct nla_policy dcbnl_bcn_nest[...] = {\n        [DCB_BCN_ATTR_RP_0]         = {.type = NLA_U8},\n        [DCB_BCN_ATTR_RP_1]         = {.type = NLA_U8},\n        [DCB_BCN_ATTR_RP_2]         = {.type = NLA_U8},\n        [DCB_BCN_ATTR_RP_3]         = {.type = NLA_U8},\n        [DCB_BCN_ATTR_RP_4]         = {.type = NLA_U8},\n        [DCB_BCN_ATTR_RP_5]         = {.type = NLA_U8},\n        [DCB_BCN_ATTR_RP_6]         = {.type = NLA_U8},\n        [DCB_BCN_ATTR_RP_7]         = {.type = NLA_U8},\n        [DCB_BCN_ATTR_RP_ALL]       = {.type = NLA_FLAG},\n        // from here is somewhat different\n        [DCB_BCN_ATTR_BCNA_0]       = {.type = NLA_U32},\n        ...\n        [DCB_BCN_ATTR_ALL]          = {.type = NLA_FLAG},\n};\n\nTherefore, the current code is buggy and this\nnla_parse_nested_deprecated could overflow the dcbnl_pfc_up_nest and use\nthe adjacent nla_policy to parse attributes from DCB_BCN_ATTR_BCNA_0.\n\nHence use the correct policy dcbnl_bcn_nest to parse the nested\ntb[DCB_ATTR_BCN] TLV.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53369",
          "url": "https://www.suse.com/security/cve/CVE-2023-53369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1250206 for CVE-2023-53369",
          "url": "https://bugzilla.suse.com/1250206"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53369"
    },
    {
      "cve": "CVE-2023-53431",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53431"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ses: Handle enclosure with just a primary component gracefully\n\nThis reverts commit 3fe97ff3d949 (\"scsi: ses: Don\u0027t attach if enclosure\nhas no components\") and introduces proper handling of case where there are\nno detected secondary components, but primary component (enumerated in\nnum_enclosures) does exist. That fix was originally proposed by Ding Hui\n\u003cdinghui@sangfor.com.cn\u003e.\n\nCompletely ignoring devices that have one primary enclosure and no\nsecondary one results in ses_intf_add() bailing completely\n\n\tscsi 2:0:0:254: enclosure has no enumerated components\n        scsi 2:0:0:254: Failed to bind enclosure -12ven in valid configurations such\n\neven on valid configurations with 1 primary and 0 secondary enclosures as\nbelow:\n\n\t# sg_ses /dev/sg0\n\t  3PARdata  SES               3321\n\tSupported diagnostic pages:\n\t  Supported Diagnostic Pages [sdp] [0x0]\n\t  Configuration (SES) [cf] [0x1]\n\t  Short Enclosure Status (SES) [ses] [0x8]\n\t# sg_ses -p cf /dev/sg0\n\t  3PARdata  SES               3321\n\tConfiguration diagnostic page:\n\t  number of secondary subenclosures: 0\n\t  generation code: 0x0\n\t  enclosure descriptor list\n\t    Subenclosure identifier: 0 [primary]\n\t      relative ES process id: 0, number of ES processes: 1\n\t      number of type descriptor headers: 1\n\t      enclosure logical identifier (hex): 20000002ac02068d\n\t      enclosure vendor: 3PARdata  product: VV                rev: 3321\n\t  type descriptor header and text list\n\t    Element type: Unspecified, subenclosure id: 0\n\t      number of possible elements: 1\n\nThe changelog for the original fix follows\n\n=====\nWe can get a crash when disconnecting the iSCSI session,\nthe call trace like this:\n\n  [ffff00002a00fb70] kfree at ffff00000830e224\n  [ffff00002a00fba0] ses_intf_remove at ffff000001f200e4\n  [ffff00002a00fbd0] device_del at ffff0000086b6a98\n  [ffff00002a00fc50] device_unregister at ffff0000086b6d58\n  [ffff00002a00fc70] __scsi_remove_device at ffff00000870608c\n  [ffff00002a00fca0] scsi_remove_device at ffff000008706134\n  [ffff00002a00fcc0] __scsi_remove_target at ffff0000087062e4\n  [ffff00002a00fd10] scsi_remove_target at ffff0000087064c0\n  [ffff00002a00fd70] __iscsi_unbind_session at ffff000001c872c4\n  [ffff00002a00fdb0] process_one_work at ffff00000810f35c\n  [ffff00002a00fe00] worker_thread at ffff00000810f648\n  [ffff00002a00fe70] kthread at ffff000008116e98\n\nIn ses_intf_add, components count could be 0, and kcalloc 0 size scomp,\nbut not saved in edev-\u003ecomponent[i].scratch\n\nIn this situation, edev-\u003ecomponent[0].scratch is an invalid pointer,\nwhen kfree it in ses_intf_remove_enclosure, a crash like above would happen\nThe call trace also could be other random cases when kfree cannot catch\nthe invalid pointer\n\nWe should not use edev-\u003ecomponent[] array when the components count is 0\nWe also need check index when use edev-\u003ecomponent[] array in\nses_enclosure_data_process\n=====",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53431",
          "url": "https://www.suse.com/security/cve/CVE-2023-53431"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1250374 for CVE-2023-53431",
          "url": "https://bugzilla.suse.com/1250374"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53431"
    },
    {
      "cve": "CVE-2023-53542",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53542"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: dts: exynos: Use Exynos5420 compatible for the MIPI video phy\n\nFor some reason, the driver adding support for Exynos5420 MIPI phy\nback in 2016 wasn\u0027t used on Exynos5420, which caused a kernel panic.\nAdd the proper compatible for it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53542",
          "url": "https://www.suse.com/security/cve/CVE-2023-53542"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251154 for CVE-2023-53542",
          "url": "https://bugzilla.suse.com/1251154"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53542"
    },
    {
      "cve": "CVE-2023-53597",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53597"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix mid leak during reconnection after timeout threshold\n\nWhen the number of responses with status of STATUS_IO_TIMEOUT\nexceeds a specified threshold (NUM_STATUS_IO_TIMEOUT), we reconnect\nthe connection. But we do not return the mid, or the credits\nreturned for the mid, or reduce the number of in-flight requests.\n\nThis bug could result in the server-\u003ein_flight count to go bad,\nand also cause a leak in the mids.\n\nThis change moves the check to a few lines below where the\nresponse is decrypted, even of the response is read from the\ntransform header. This way, the code for returning the mids\ncan be reused.\n\nAlso, the cifs_reconnect was reconnecting just the transport\nconnection before. In case of multi-channel, this may not be\nwhat we want to do after several timeouts. Changed that to\nreconnect the session and the tree too.\n\nAlso renamed NUM_STATUS_IO_TIMEOUT to a more appropriate name\nMAX_STATUS_IO_TIMEOUT.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53597",
          "url": "https://www.suse.com/security/cve/CVE-2023-53597"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251159 for CVE-2023-53597",
          "url": "https://bugzilla.suse.com/1251159"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53597"
    },
    {
      "cve": "CVE-2023-53641",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53641"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: hif_usb: fix memory leak of remain_skbs\n\nhif_dev-\u003eremain_skb is allocated and used exclusively in\nath9k_hif_usb_rx_stream(). It is implied that an allocated remain_skb is\nprocessed and subsequently freed (in error paths) only during the next\ncall of ath9k_hif_usb_rx_stream().\n\nSo, if the urbs are deallocated between those two calls due to the device\ndeinitialization or suspend, it is possible that ath9k_hif_usb_rx_stream()\nis not called next time and the allocated remain_skb is leaked. Our local\nSyzkaller instance was able to trigger that.\n\nremain_skb makes sense when receiving two consecutive urbs which are\nlogically linked together, i.e. a specific data field from the first skb\nindicates a cached skb to be allocated, memcpy\u0027d with some data and\nsubsequently processed in the next call to ath9k_hif_usb_rx_stream(). Urbs\ndeallocation supposedly makes that link irrelevant so we need to free the\ncached skb in those cases.\n\nFix the leak by introducing a function to explicitly free remain_skb (if\nit is not NULL) when the rx urbs have been deallocated. remain_skb is NULL\nwhen it has not been allocated at all (hif_dev struct is kzalloced) or\nwhen it has been processed in next call to ath9k_hif_usb_rx_stream().\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53641",
          "url": "https://www.suse.com/security/cve/CVE-2023-53641"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251728 for CVE-2023-53641",
          "url": "https://bugzilla.suse.com/1251728"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53641"
    },
    {
      "cve": "CVE-2023-53676",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53676"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53676",
          "url": "https://www.suse.com/security/cve/CVE-2023-53676"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251786 for CVE-2023-53676",
          "url": "https://bugzilla.suse.com/1251786"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251787 for CVE-2023-53676",
          "url": "https://bugzilla.suse.com/1251787"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-53676"
    },
    {
      "cve": "CVE-2025-38436",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38436"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/scheduler: signal scheduled fence when kill job\n\nWhen an entity from application B is killed, drm_sched_entity_kill()\nremoves all jobs belonging to that entity through\ndrm_sched_entity_kill_jobs_work(). If application A\u0027s job depends on a\nscheduled fence from application B\u0027s job, and that fence is not properly\nsignaled during the killing process, application A\u0027s dependency cannot be\ncleared.\n\nThis leads to application A hanging indefinitely while waiting for a\ndependency that will never be resolved. Fix this issue by ensuring that\nscheduled fences are properly signaled when an entity is killed, allowing\ndependent applications to continue execution.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38436",
          "url": "https://www.suse.com/security/cve/CVE-2025-38436"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1247227 for CVE-2025-38436",
          "url": "https://bugzilla.suse.com/1247227"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-38436"
    },
    {
      "cve": "CVE-2025-39819",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-39819"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-39819",
          "url": "https://www.suse.com/security/cve/CVE-2025-39819"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1250176 for CVE-2025-39819",
          "url": "https://bugzilla.suse.com/1250176"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-39819"
    },
    {
      "cve": "CVE-2025-39967",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-39967"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: fix integer overflow in fbcon_do_set_font\n\nFix integer overflow vulnerabilities in fbcon_do_set_font() where font\nsize calculations could overflow when handling user-controlled font\nparameters.\n\nThe vulnerabilities occur when:\n1. CALC_FONTSZ(h, pitch, charcount) performs h * pith * charcount\n   multiplication with user-controlled values that can overflow.\n2. FONT_EXTRA_WORDS * sizeof(int) + size addition can also overflow\n3. This results in smaller allocations than expected, leading to buffer\n   overflows during font data copying.\n\nAdd explicit overflow checking using check_mul_overflow() and\ncheck_add_overflow() kernel helpers to safety validate all size\ncalculations before allocation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-39967",
          "url": "https://www.suse.com/security/cve/CVE-2025-39967"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252033 for CVE-2025-39967",
          "url": "https://bugzilla.suse.com/1252033"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-39967"
    },
    {
      "cve": "CVE-2025-40001",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40001"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove)            | CPU 1 (delayed work callback)\nmvs_pci_remove()          |\n  mvs_free()              | mvs_work_queue()\n    cancel_delayed_work() |\n      kfree(mvi)          |\n                          |   mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40001",
          "url": "https://www.suse.com/security/cve/CVE-2025-40001"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252303 for CVE-2025-40001",
          "url": "https://bugzilla.suse.com/1252303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40001"
    },
    {
      "cve": "CVE-2025-40027",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40027"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n      Thread 1                              Thread 2\n    ...\n    p9_client_create()\n    ...\n    p9_fd_create()\n    ...\n    p9_conn_create()\n    ...\n    // start Thread 2\n    INIT_WORK(\u0026m-\u003erq, p9_read_work);\n                                        p9_read_work()\n    ...\n    p9_client_rpc()\n    ...\n                                        ...\n                                        p9_conn_cancel()\n                                        ...\n                                        spin_lock(\u0026m-\u003ereq_lock);\n    ...\n    p9_fd_cancelled()\n    ...\n                                        ...\n                                        spin_unlock(\u0026m-\u003ereq_lock);\n                                        // status rewrite\n                                        p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n                                        // first remove\n                                        list_del(\u0026req-\u003ereq_list);\n                                        ...\n\n    spin_lock(\u0026m-\u003ereq_lock)\n    ...\n    // second remove\n    list_del(\u0026req-\u003ereq_list);\n    spin_unlock(\u0026m-\u003ereq_lock)\n  ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40027",
          "url": "https://www.suse.com/security/cve/CVE-2025-40027"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252763 for CVE-2025-40027",
          "url": "https://bugzilla.suse.com/1252763"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40027"
    },
    {
      "cve": "CVE-2025-40030",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40030"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40030",
          "url": "https://www.suse.com/security/cve/CVE-2025-40030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252773 for CVE-2025-40030",
          "url": "https://bugzilla.suse.com/1252773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40030"
    },
    {
      "cve": "CVE-2025-40040",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40040"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[   44.607039] ------------[ cut here ]------------\n[   44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[   44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[   44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[   44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[   44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[   44.617726] Call Trace:\n[   44.617926]  \u003cTASK\u003e\n[   44.619284]  userfaultfd_release+0xef/0x1b0\n[   44.620976]  __fput+0x3f9/0xb60\n[   44.621240]  fput_close_sync+0x110/0x210\n[   44.622222]  __x64_sys_close+0x8f/0x120\n[   44.622530]  do_syscall_64+0x5b/0x2f0\n[   44.622840]  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[   44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all().  Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide.  This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation.  This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[   45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40040",
          "url": "https://www.suse.com/security/cve/CVE-2025-40040"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252780 for CVE-2025-40040",
          "url": "https://bugzilla.suse.com/1252780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40040"
    },
    {
      "cve": "CVE-2025-40048",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40048"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer.  So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n  message in the ring buffer, it doesn\u0027t generate an interrupt.\n  This is the correct behavior, because the host should only send an\n  interrupt when the inbound ring buffer transitions from empty to\n  not-empty. Adding an additional message to a ring buffer that is not\n  empty is not supposed to generate an interrupt on the guest.\n  Since the guest is waiting in pread() and not removing messages from\n  the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40048",
          "url": "https://www.suse.com/security/cve/CVE-2025-40048"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252862 for CVE-2025-40048",
          "url": "https://bugzilla.suse.com/1252862"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40048"
    },
    {
      "cve": "CVE-2025-40055",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40055"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time.  Set \"lc\" to NULL on this\npath to avoid a double free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40055",
          "url": "https://www.suse.com/security/cve/CVE-2025-40055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252821 for CVE-2025-40055",
          "url": "https://bugzilla.suse.com/1252821"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40055"
    },
    {
      "cve": "CVE-2025-40070",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40070"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n  ------------[ cut here ]------------\n  WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n  Modules linked in:\n  CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n  RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n  Call Trace:\n   \u003cTASK\u003e\n   kobject_cleanup+0x136/0x410 lib/kobject.c:689\n   kobject_release lib/kobject.c:720 [inline]\n   kref_put include/linux/kref.h:65 [inline]\n   kobject_put+0xe9/0x130 lib/kobject.c:737\n   put_device+0x24/0x30 drivers/base/core.c:3797\n   pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n   pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n   pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n   tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n   tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n   tiocsetd drivers/tty/tty_io.c:2429 [inline]\n   tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n   vfs_ioctl fs/ioctl.c:51 [inline]\n   __do_sys_ioctl fs/ioctl.c:598 [inline]\n   __se_sys_ioctl fs/ioctl.c:584 [inline]\n   __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n   do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e\n   \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40070",
          "url": "https://www.suse.com/security/cve/CVE-2025-40070"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252836 for CVE-2025-40070",
          "url": "https://bugzilla.suse.com/1252836"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40070"
    },
    {
      "cve": "CVE-2025-40083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40083",
          "url": "https://www.suse.com/security/cve/CVE-2025-40083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252912 for CVE-2025-40083",
          "url": "https://bugzilla.suse.com/1252912"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40083"
    },
    {
      "cve": "CVE-2025-40173",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40173"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40173",
          "url": "https://www.suse.com/security/cve/CVE-2025-40173"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253421 for CVE-2025-40173",
          "url": "https://bugzilla.suse.com/1253421"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40173"
    },
    {
      "cve": "CVE-2025-40186",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40186"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS:  00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40186",
          "url": "https://www.suse.com/security/cve/CVE-2025-40186"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253438 for CVE-2025-40186",
          "url": "https://bugzilla.suse.com/1253438"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-40186"
    },
    {
      "cve": "CVE-2025-40204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40204",
          "url": "https://www.suse.com/security/cve/CVE-2025-40204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253436 for CVE-2025-40204",
          "url": "https://bugzilla.suse.com/1253436"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253437 for CVE-2025-40204",
          "url": "https://bugzilla.suse.com/1253437"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-40204"
    },
    {
      "cve": "CVE-2025-40205",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40205"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40205",
          "url": "https://www.suse.com/security/cve/CVE-2025-40205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253456 for CVE-2025-40205",
          "url": "https://bugzilla.suse.com/1253456"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_283-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.283.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.283.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.283.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-12-23T16:19:45Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40205"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…